From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Disable logging and hide files

Disable logging and hide files

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Disable logging and hide files

- [Voiceover] When conducting an ethical hacking exercise, one valuable skill is to be able to hid files and tools with the goal of getting back into the system. Files can be hidden in alternate data streams, or Steganography, but ultimately, installing a rootkit will provide a way to hide tools, give backdoor access to a system, and also some rootkits have log scrubbers to hide any activity. When administrative access is achieved, the ethical hacker can disable auditing. We can do this via the command line interface, or the graphical user interface. Before you get out of the system, you'll want to turn auditing back on. Let's a take a look. The Microsoft server family of operating systems is popular with small businesses, so let's take a couple of ways to view auditing here in server 2008. I'm at the command prompt, I'll right-click and run as administrator. And I'll type audit policy, list, space, user. And here we can see the audit policy is defined for the following user accounts.…

Contents